woot 2017 Aug. 14, 2017 to Aug. 14, 2017, vancouver,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Collin Mulliner , William Enck N/A
dr0wned – Cyber-Physical Attack with Additive Manufacturing Yuval Elovici , Sofia Belikovetsky , Mark Yampolskiy , Jinghui Toh , Jacob Gatlin N/A
Automated PCB Reverse Engineering Frank Kargl , Stephan Kleber , Henrik Ferdinand Nölscher N/A
BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection Ang Cui , Rick Housley N/A
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks Matthias Neugschwandtner , Anil Kurmus , Nikolas Ioannou , Nikolaos Papandreou , Thomas Parnell N/A
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery Fabian "fabs" Yamaguchi , Konrad Rieck , Federico Maggi , Malte Skoruppa , Jean-pierre Seifert , Bhargava Shastry , Tommi Unruh N/A
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions Wouter Joosen , Tom Van Goethem N/A
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge Dave Levin , Daven Patel , Kevin Bock , George Hughey N/A
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection Lorenzo Cavallaro , Johannes Kinder , James Patrick-evans N/A
Exploitations of Uninitialized Uses on macOS Sierra Tielei Wang , Hao Xu , Zhenquan Xu , Gongshen Liu N/A
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing Fabian "fabs" Yamaguchi , Konrad Rieck , Federico Maggi , Jean-pierre Seifert , Bhargava Shastry N/A
Software Grand Exposure: SGX Cache Attacks Are Practical Srdjan Capkun , Kari Kostiainen , Ahmad-reza Sadeghi , Alexandra Dmitrienko , Ferdinand Brasser , Urs Müller N/A
Stalling Live Migrations on the Cloud Thomas La Porta , Zhiyun Qian , Srikanth V. Krishnamurthy , Ahmed Atya , Azeem Aqil , Karim Khalil N/A
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit Yuval Elovici , Mordechai Guri , Yosef Solewicz , Andrey Daidakulov N/A
Breaking and Fixing Gridcoin Juraj Somorovsky , Jörg Schwenk , Martin Grothe , Tobias Niemann N/A
Adversarial Example Defense: Ensembles of Weak Defenses are not Strong Dawn Song , Nicholas Carlini , Warren He , James Wei , Xinyun Chen N/A
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection Andy Davis , Brendan Dolan-gavitt , Patrick Hulin , Andrew Fasano , Rahul Sridhar , Cody Gallagher , Aaron Sedlacek , Tim Leek N/A
Shedding too much Light on a Microcontroller's Firmware Protection Johannes Obermaier , Stefan Tatschner N/A
Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System David Oswald , Luca Reverberi N/A
One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited Mathieu Renard , Ryad Benadjila , Chaouki Kasmi , José Lopes-esteves N/A
Shattered Trust: When Replacement Smartphone Components Attack Asaf Shabtai , Yossi Oren , Omer Shwartz , Amir Cohen N/A
White-Stingray: Evaluating IMSI Catchers Detection Applications Ravishankar Borgaonkar , Andrew Martin , Jean-pierre Seifert , Altaf Shaik , Shinjo Park N/A